The present application claims priority from Japanese application JP2004-269110 filed on Sep. 16, 2004, the content of which is hereby incorporated by reference into this application.
The present invention relates to a reproducing apparatus and a recording/reproducing apparatus for recording/reproducing information to and from a recording medium.
As related background art, there has been JP-A-8-147159 that describes a virus check ID indicating whether a virus check has already been executed by a virus program for a purpose of preventing beforehand the virus program from invading a hard disc of a system. If there is the virus check ID, an access is permitted, whereas if the virus check ID does not exist, the disc is checked whether a virus program exists. If a virus program is not detected or if it is judged that the disc was infected by the virus program and the virus program was removed, a virus check ID is registered in the disc to permit access to files.
In a multi-function AV apparatus, each function typically Graphical User Interface (GUI) is possibly realized in general software execution environments typically JAVA. If these software execution environments are used, it is not necessary to develop software for each apparatus and it is advantageous in that software once developed can be executed by any apparatus.
AV apparatuses having general software execution environments have an increased danger of infection by a software virus (hereinafter simply called a virus) via a network or a recording medium.
As compared to the field of PCs (Personal Computers) described in JP-A-8-147159, home AV apparatuses are required to provide each function which is easy to use. Namely, in realizing each function, even if general software is executed internally, a user is not requested to recognize each operation, and an I/F should not be used, which is hard to be understood the operation of recognizing the I/F.
In a reproducing apparatus and a recording/reproducing apparatus of the present invention, there is a possibility that a virus invades the apparatus not only via a network but also via a privately created recording medium or the like and it is necessary to consider a method capable of effectively checking a virus.
From the essential nature of an AV apparatus, reproduction and execution of data are performed, which data is trustworthy such as without virus infection. It is not preferable to always check a virus and consume time in a normal operation. A system is required to be considered, which system can select a security level indicating how a virus is checked and is provided with a user I/F easy to understand and specific to AV apparatuses.
The present invention has been made in consideration of these circumstances, and it is an object of the present invention to provide a reproducing apparatus and a recording/reproducing apparatus capable of efficiently checking a virus when a general software is executed and allowing a user to positively adjust a security level.
In order to achieve this object of the present invention, an I/F is prepared for allowing a user to set a security level as desired with simple operations. When software is executed, an authentication operation of whether the software execution is permitted or not is changed in accordance with a set security level.
According to the present invention, there are provided a reproducing apparatus and a recording/reproducing apparatus with improved operability.
Other objects, features and advantages of the invention will become apparent from the following description of the embodiments of the invention taken in conjunction with the accompanying drawings.
The contents of a recording medium to be reproduced by a home reproducing apparatus or recording/reproducing apparatus may include mainly AV data, its additional information or its related software. This software is executed in connection with the AV data.
A main object of a user is to view AV data. As the software is executed, retrieval of the AV data becomes easy, and related additional information (e.g., who appears, where photographed and the like) can be reproduced synchronously with the AV data.
AV data may be one of video data and audio data, or both video data and audio data.
The AV data corresponds to main data of the movie like DVD of videos for sale. Reproduction of AV data itself has a small possibility of damaging the apparatus directly. However, the software is executed in general software execution environments, and if the software contains a virus or the like, the apparatus may have large damages when the software is executed.
In the following embodiments, with reference to the accompanying drawings, description will be made specifically on how authentication is executed to judge whether software is executed or not.
As the operation starts (S101) executing desired software, a security level L set to the recording/reproducing apparatus is confirmed (S102). If L=0 (lowest level), the software is executed (S103). If L is not 0 (other than the lowest level), a check process such as a virus check corresponding to the set L is executed (S104). If the check process judges that execution is permitted, the software is executed (S103). In the check process judges that execution is inhibited, an execution inhibition message is displayed (S105) to a user (S105) to thereafter terminate the process (S106).
The security level L can be selected by a user. For example, a user can positively raise the security level of the recording/reproducing apparatus if virus infection of general software is alarmed publicly. Some user may feel cumbersome to check each time general software is executed and may always desire a priority of operation smoothness by bearing individual responsibility. In this case, setting of L=0 (lowest level) can be made.
For setting the security level, a security level setting screen such as shown in
If a user selects a button 201 to set L=0, as described earlier any software is executed without the check process such as virus check. If the user selects a button 202 to set L=1, any software is executed by limiting its function. In the general software execution environments typically JAVA and the like, a plurality of command groups are prepared and a proper combination of commands is executed according to the read software. Since it can be considered that a virus is attached to a particular command, only necessary and minimum commands are executed. However, even necessary and minimum commands are executed, executing the software in the general software execution environment may have by itself a risk. All commands may also be limited. The details of an operation example will be later given.
If the user selects a button 203 to set L=2, execution of any software is limited. Namely, in accordance with some judgement criterion, execution and reproduction of all contents contained in the disc are not performed. This is because some contents require to execute software in the recording medium when AV data is reproduced. One example of executing software in association with the AV data is execution of software when AV data is reproduced normally. However, if AV data can be reproduced without executing the software in the recording medium, the AV data may be reproduced without executing the software even at the setting of L=2.
If the user selects a button 204 to set L=3, when any software is executed, the check process is performed at a predetermined site on an external network. The predetermined site is an officially managed facility such as a specification organization of recording media of recording/reproducing apparatuses. If the authentication at this site is not performed, execution and reproduction are not performed.
A button 205 is prepared for returning to an initial system setting screen. This button is not essential if the same function is realized by a cancel key of a remote controller or the like.
In
With reference to
First, a reproduction operation will be described. When a reproduction operation is to be started, a user inserts a desired optical disc 301 into the recording/reproducing apparatus 300 and makes a reproduction instruction by using a remote controller or a key on the recording/reproducing apparatus. The reproduction instruction entered by the user via the user I/F 302 is analyzed by the control unit 303 which in turn starts the reproduction of the optical disc 301. However, depending upon the data structure of the optical disc 301, initial activation software is executed without the user instruction.
Recorded in the optical disc 301 are not only AV files but also a play list file indicating a file reproduction order, a program file for executing a predetermined procedural process corresponding to the above-described general software execution environment. First, file management information is read in order to discriminate files recorded in the optical disc 301. More specifically, the control unit 303 instructs the drive 306 to read anchor information on a predetermined sector and makes the optical pickup 307 read data written in the predetermined sector. In accordance with this information, a record position of the file management information is obtained to thereby read the file management information. In recording the file management information, a file system typically Universal Disc Format (UDF) for example may be used. By using the file system, information recorded on the disc can be processed as a file, and the file to be read can be designated by a file identifier (file name).
For starting the reproduction, a file designated by the management information file is read to read initial startup software. More specifically, the control unit 303 operates to read the designated file from the optical disc 301. At this stage, since software information is added to the file, the process is performed in accordance with this software. Namely, if the first read file is the file corresponding to the initial startup software, the control unit 303 uses the read file as software to be executed in the general software execution environment.
At the stage immediately before execution, the security level L set to the system is checked. If L=0, the software read from the optical disc 301 is developed in a storage area of the control unit 303 to sequentially analyze and execute it. For example, if the initial startup software corresponds to a browser for displaying a disc content menu, a content menu screen such as shown in
In
Description will be made on a content reproduction operation of reproducing an actual AV file. As a particular content is eventually determined in the screen shown in
The above-described content menu screen along with other screens to be presented to a user other than a reproduction screen are also output from the output unit 311 via the decoder unit 310 and the memory 304 and control unit 303, or the network control unit 308.
Next, a recording operation will be described briefly. A recording operation is performed in a reversed order of the reproduction operation. Data input from the input unit 313 is A/D converted if necessary, and the encoder unit 312 encodes and multiplexes video data and audio data to generate stream data which is once stored in the track buffer 305. The stream data is read from the track buffer 305 by absorbing a difference between a transfer rate of the drive 306 and a coding rate of the stream data, and recorded in the optical disc 301 at a predetermined address via the pickup 307.
The input unit 313 may include a reception unit for receiving broadcast data. If the reception content is digital data already encoded and multiplexed, the operation at the encoder unit 312 is omitted.
Next, a network operation will be described. If a predetermined address on an external network is to be accessed, the control unit 303 passes necessary information to the network control unit 308 which in turn analyzes it and accesses the predetermined address on the external network via the network I/F 309. Data may be transmitted via the network I/F 309 or may be acquired from the external and stored in the memory 304 to be used for a predetermined operation.
Next, description will be made on a more specific example of the execution operation of software if the above-described security level L is not 0. In the following description, it is assumed that a disc recording particular AV data also records a content menu browser as the initial startup software.
As the operation starts (S401), since the security level L is 1, a disc ID of the optical disc 301 shown in
The acquired disc ID is compared with a past reproduction history stored in the memory of the recording/reproducing apparatus (S403). If the disc was reproduced in the past, it means that there is no risk of virus infection or the like. Therefore, similar to the case of L=0, the initial startup software is executed and the content menu shown in
If the coincidence judgement step S403 with the reproduction history indicates that the disc ID does not coincide with the past reproduction history, i.e., if the disc is reproduced for the first time in the recording/reproducing apparatus, the initial startup software is executed limitatively. Namely, since viewing the recorded AV data as the content of the optical disc is a minimum object of the user, only the menu display command is validated and other commands are not made executable. Therefore, for example, as shown in
In this embodiment, although the disc ID is compared with the past reproduction history at the coincidence judgement step S403 with the reproduction history, this judgement process may not be executed but the software may be executed by always limiting the command at L=1. This is particularly effective if a disc itself is created privately and the identification of a file unit is not clear. Furthermore, in this embodiment, although the execution command for the software is limited and a simple GUI menu is displayed, if the recording/reproducing apparatus itself has a processing function corresponding to a simple browser, a menu may be displayed by this browser function by limiting all commands at L=1.
Next, the operation at the security level L is 2 will be described.
Similar to L=1, as the operation starts (S701), a disc ID is acquired (S402). The acquired disc ID is compared with a past reproduction history to judge if there is coincidence (S403). As different from L=1, if the disc ID does not coincide with the past reproduction history, all operations are inhibited and an execution inhibition message such as shown in
Also in this embodiment, similar to the case of L=1, the coincidence judgement step S403 may not compare the disc ID with the past reproduction history, but all operations are always inhibited at L=2 and the execution inhibition message may be displayed.
Next, the operation at the security level L=3 will be described.
When the predetermined site is to be accessed, the address thereof on the network is designated by using identification information, called Unified Resource Locator (URL). It is assumed that URL is registered beforehand in the recording/reproducing apparatus, or it may be rewritten externally. In this embodiment, when the predetermined site is connected, it is assumed that an execution confirmation screen of a content check prepared at the predetermined site is displayed. For displaying this confirmation screen, a browser may become necessary in some cases. Therefore, while the predetermined site performs the check process (S904), a GUI screen of the recording/reproducing apparatus may be displayed instead of displaying the screen prepared on the side of the predetermined site.
Similar to the operation described above, and similar to the case of L=1, the coincidence judgement step S403 may not compare the disc ID with the past reproduction history, but a user may always be urged to perform the check at the predetermined site at L=3.
With reference to
If a user judges at the recording/reproducing apparatus 300 that the content check should be executed on the network, the check processing unit 1303 of the authentication site 1302 acquires necessary information on the content and checks the content by using predetermined data in the database 1304. More specifically, disc ID information acquired at the disc ID acquisition step S402 shown in
In the above-described embodiment, although the disc ID is acquired at the first judgement process, the embodiment is not limited thereto. For example, if identification information of a file unit can be acquired, the file unit may be used as a judgement criterion. Also in the above-described embodiment, although the initial startup software recorded in a disc is always executed, it is obvious that the recording/reproducing apparatus may store software downloaded from an external network in its internal memory and execute the software in the general software execution environment to check a content in accordance with the security level as described earlier. In this case, the disc ID is not necessary to be checked, but the check at each security level is always performed. In the above-described embodiment, although the number of security levels is four, the number of security levels is not limited to a particular number.
With the above-described embodiment, it becomes possible for a user to positively select the security level by using an intuitive I/F, and it becomes possible to inhibit the execution of a virus which might damage the apparatus.
A different point of the second embodiment from the first embodiment resides in that setting the security level of the recording/reproducing apparatus 300 can be set externally via the network. If the authentication site 1501 judges socially that the security level should be changed, the security level setting unit 1502 changes the security level of the recording/reproducing apparatus 300 on the user side via the network. The content check operation at each security level is the same as that of the first embodiment, and the description thereof is omitted.
Since a user is not necessary to acquire external update information and change the security level, the security can be improved. However, since some users are not necessary to forcibly change the security level, it is possible to use the positive security level changing device of the first embodiment in addition to the forcible security level change.
With the above-described embodiment, it becomes possible for a user to select the security level and execute a software authentication operation by a desired method, and it becomes possible to inhibit the execution of a virus which might damage the apparatus.
If an operation which has apparently no danger is to be performed, an unnecessary process will not be executed by adjusting the security level so that easy-to-use of the apparatus will not be degraded.
Security of the reproducing apparatus and recording/reproducing apparatus can be improved without involvement of user recognition, by allowing the security level to be changed externally.
It should be further understood by those skilled in the art that although the foregoing description has been made on embodiments of the invention, the invention is not limited thereto and various changes and modifications may be made without departing from the spirit of the invention and the scope of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
2004-269110 | Sep 2004 | JP | national |